Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
AE-PO-WIN-SEC-C-FW
Data collected on: 2-9-2025 09:29:14
General
Details
Domainemea.tpg.ads
OwnerEMEA\ygalal.5
Created3-7-2019 12:38:36
Modified9-2-2023 14:49:24
User Revisions0 (AD), 0 (SYSVOL)
Computer Revisions49 (AD), 49 (SYSVOL)
Unique ID{93335554-fe73-4ca5-8f88-0441263999e1}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
DXBNoDisabledemea.tpg.ads/AE/Systems/Clients/DXB

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\AE-L-SEC-Windows 10 Policies Computer Settings
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\AE-L-SEC-Windows 10 Policies Computer SettingsRead (from Security Filtering)No
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\Domain ComputersReadNo
EMEA\ygalal.5Edit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-367117Edit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
System Services
Remote Registry (Startup Mode: Automatic)
Permissions
No permissions specified
Auditing
No auditing specified
Remote Procedure Call (RPC) (Startup Mode: Automatic)
Permissions
No permissions specified
Auditing
No auditing specified
Windows Management Instrumentation (Startup Mode: Automatic)
Permissions
No permissions specified
Auditing
No auditing specified
Windows Firewall with Advanced Security
Global Settings
PolicySetting
Policy version2.30
Disable stateful FTPNot Configured
Disable stateful PPTPNot Configured
IPsec exemptNot Configured
IPsec through NATNot Configured
Preshared key encodingNot Configured
SA idle timeNot Configured
Strong CRL checkNot Configured
Inbound Rules
NameDescription
Windows Management Instrumentation (ASync-In)Inbound rule to allow Asynchronous WMI traffic for remote Windows Management Instrumentation. [TCP]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%systemroot%\system32\wbem\unsecapp.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupWindows Management Instrumentation (WMI)
Windows Management Instrumentation (WMI-In)Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
Servicewinmgmt
Allow edge traversalFalse
GroupWindows Management Instrumentation (WMI)
Windows Management Instrumentation (DCOM-In)Inbound rule to allow DCOM traffic for remote Windows Management Instrumentation. [TCP 135]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port135
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
Servicerpcss
Allow edge traversalFalse
GroupWindows Management Instrumentation (WMI)
File and Printer Sharing (LLMNR-UDP-In)Inbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port5355
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeLocal subnet
ProfileAll
Network interface typeAll
Servicednscache
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (Echo Request - ICMPv6-In)Echo Request messages are sent as ping requests to other nodes.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol58
Local portAny
Remote portAny
ICMP settingstype 128:code any
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (Echo Request - ICMPv4-In)Echo Request messages are sent as ping requests to other nodes.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol1
Local portAny
Remote portAny
ICMP settingstype 8:code any
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (Spooler Service - RPC-EPMAP)Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Spooler Service.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portRPC endpoint mapping
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceRpcss
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (Spooler Service - RPC)Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\spoolsv.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portDynamic RPC
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceSpooler
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (NB-Datagram-In)Inbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port138
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (NB-Name-In)Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port137
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (SMB-In)Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port445
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (NB-Session-In)Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port139
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
Remote Event Log Management (RPC-EPMAP)Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Event Log Service.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portRPC endpoint mapping
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceRPCSS
Allow edge traversalFalse
GroupRemote Event Log Management
Remote Event Log Management (NP-In)Inbound rule for the local Event Log service to be remotely managed over Named Pipes.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port445
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupRemote Event Log Management
Remote Event Log Management (RPC)Inbound rule for the local Event Log service to be remotely managed via RPC/TCP.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portDynamic RPC
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceEventlog
Allow edge traversalFalse
GroupRemote Event Log Management
Network Discovery (Pub-WSD-In)Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port3702
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeLocal subnet
ProfileAll
Network interface typeAll
Servicefdrespub
Allow edge traversalFalse
GroupNetwork Discovery
Network Discovery (LLMNR-UDP-In)Inbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port5355
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeLocal subnet
ProfileAll
Network interface typeAll
Servicednscache
Allow edge traversalFalse
GroupNetwork Discovery
Network Discovery (WSD-In)Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port3702
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeLocal subnet
ProfileAll
Network interface typeAll
Servicefdphost
Allow edge traversalFalse
GroupNetwork Discovery
Network Discovery (SSDP-In)Inbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port1900
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeLocal subnet
ProfileAll
Network interface typeAll
ServiceSsdpsrv
Allow edge traversalFalse
GroupNetwork Discovery
Network Discovery (WSD Events-In)Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port5357
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupNetwork Discovery
Network Discovery (WSD EventsSecure-In)Inbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port5358
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupNetwork Discovery
Network Discovery (NB-Datagram-In)Inbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port138
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupNetwork Discovery
Network Discovery (NB-Name-In)Inbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port137
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupNetwork Discovery
Network Discovery (UPnP-In)Inbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP 2869]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port2869
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupNetwork Discovery
Allow ICMP V4
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol1
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Avaya one X
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Programc:\Program Files (x86)\Avaya\Avaya one-X Agent\sparkEmulator.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Connection Security Settings
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Network/Network Connections/Windows Defender Firewall/Domain Profile
PolicySettingComment
Windows Defender Firewall: Allow inbound remote administration exception Enabled
Allow unsolicited incoming messages from these IP addresses:10.127.101.75
Syntax:
Type "*" to allow messages from any network, or
else type a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
Example: to allow messages from 10.0.0.1,
10.0.0.2, and from any system on the
local subnet or on the 10.3.4.x subnet,
type the following in the "Allow unsolicited"
incoming messages from these IP addresses":
10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24
PolicySettingComment
Windows Defender Firewall: Define inbound port exceptionsEnabled
Define port exceptions:
2701:UDP:*:enabled:Remote Control
2701:TCP:*:enabled:Remote Control
2702:TCP:*:enabled:Remote Data
2702:UDP:*:enabled:Remote Data
135:TCP:*:enabled:RPC
3389:TCP:*:enabled:Remote Assistance
Specify the port to open or block.
Syntax:
<Port>:<Transport>:<Scope>:<Status>:<Name>
<Port> is a decimal port number
<Transport> is either "TCP" or "UDP"
<Scope> is either "*" (for all networks) or
a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
<Status> is either "enabled" or "disabled"
<Name> is a text string
Example:
The following definition string adds TCP port 80
to the port exceptions list and allows it to
receive messages from 10.0.0.1, 10.0.0.2, or any
system on the 10.3.4.x subnet:
80:TCP:10.0.0.1,10.0.0.2,10.3.4.0/24:enabled:Web service
User Configuration (Enabled)
No settings defined.